Monthly Archives: February 2018

Customer Care Means Listening Not Measuring

Posted by & filed under .

Customer Care is like fishing. You can measure your success on sheer volume, but the party on the other end of the line may not feel the same way. NTT DATA Services recently conducted a survey and about how companies manage automated solutions in customer service. At a high level the results are 80% of […]

Penetrating Industrial IoT with LTE

Posted by & filed under .

Cellular solutions were originally about mobility. After all why would a perfectly good plain old telephone service company invest in penetrating homes with an additional line when they had the wiring already there? The focus then was to tame the great outdoors with technology. Over the years though the service has been modified to the […]

Elon Musk is Boring Company!

Posted by & filed under .

  How about I start by pointing out something less than obvious. Regulation on existing legacy systems makes it hard for innovation on current technologies. High Speed Rail in Europe and Asia was looked at and modified to fit into existing US models with Amtrak’s Metroliner. At the end of the day the “high speed” […]

Cyber Security for Smart Grids? Hail CESER!

Posted by & filed under .

Rick Perry, former Governor of Texas and the U.S. Secretary of the Department of Energy (DOE) established a new Office of Cybersecurity, Energy Security, and Emergency Response (CESER) at the U.S. Department of Energy (DOE). CESER is in President Trumps budget for an allocation of $96 M to increase DOE’s ability to respond to cyber […]

Don’t Eat Yellow… Ice Cream

Posted by & filed under .

Have you ever bought something with vanilla ice cream in it (like an ice cream sandwich) and found that its edges are tinged yellow. That is because the ice cream at one point was not kept at the proper temperature. Obviously this is a job for IoT. One company that is increasingly being called upon […]

Does It Take An Olympian Effort to Hack the Olympic Games?

Posted by & filed under .

There are lots of story opportunities to talk about here. According to the NY Times the attack was based on some stolen credentials from a member of the Korean Olympic Committee. Just likes Clams, one coughs and gives them all away. From that one credential came a cascade of troubles, including the loss of Wi-Fi, […]

Not Just Yet Another Protocol: Advanced Message Queueing Protocol [AMQP]

Posted by & filed under .

I know, I know. Don’t we have enough protocols in this world? Well if any one should know the answer to this it’s Solace. Solace could be considered a messaging broker for today’s enterprises – providing the ability to interconnect new cloud-based assets with existing systems that are established and too costly to change at […]